• Title/Summary/Keyword: browser

Search Result 830, Processing Time 0.028 seconds

System implementation share of voice and sign language (지화인식 기반의 음성 및 SNS 공유 시스템 구현)

  • Kang, Jung-Hun;Yang, Dea-Sik;Oh, Min-Seok;Sir, Jung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.644-646
    • /
    • 2016
  • Deaf are it is difficult to communicate to represent the voice heard, so theay use mostly using the speech, sign language, writing, etc. to communicate. It is the best way to use sign language, in order to communicate deaf and normal people each other. But they must understand to use sign language. In this paper, we designed and implementated finger language translation system to support communicate between deaf and normal people. We used leap motion as input device that can track finger and hand gesture. We used raspberry pi that is low power sing board computer to process input data and translate finger language. We implemented application used Node.js and MongoDB. The client application complied with HTML5 so that can be support any smart device with web browser.

  • PDF

Android App remote database management systems using service in Social Network (소셜 네트워크에서 안드로이드 앱 서비스를 이용한 원격 데이터베이스 관리 시스템)

  • Hwang, Chi-Gon;Moon, Seok-Jae;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.254-256
    • /
    • 2014
  • In this paper, using the Android App to remote database monitoring system is proposed. Existing remote database monitoring scheme CS(Client / Server) based. Conventional CS based systems are space constraints and a plurality of administrator to access the database at that degrade performance disadvantages. The advantage of the proposed system first, because the web -based interface allows the application program, and also the ease of maintenance, through a web browser, if you have Internet access anytime, anywhere environment without restrictions of time and space monitoring. Second, the proposed system because the App -based technology due to an increase in connection session and query execution does not affect the performance of your database. Third, if there is a problem with the remote database through which social networks immediately notify the administrator of the smartphone in real time so that the administrator can identify the problem.

  • PDF

HTML5-based Streaming System Designed for Real-time Store Video (HTML5기반 실시간 저장 영상에 대한 스트리밍 시스템 설계)

  • Ban, Tae-Hak;Bae, Eun-Ah;Kim, Jong-Moon;Jeong, In-Yong;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.736-738
    • /
    • 2014
  • As part of real-time streaming service, which is one of the latest QoS technology has become the issue. But the current majority of streaming services are specific S/W I a separate setup program supports real-time streaming service a reality, will be stored until the end of the video, save for a video about editing and is not available. In this paper, a video about multi-threaded and distributed processing system applied to the Storm technique based on separate software or installation of programs without the H T M L 5-based Web content is produced by each device using a Web browser, real-time streaming system you want, no. This is a streaming service that provides users with real-time editing and the footage is stored as about and respond in real time between the server and the client and content sharing that need training and will be utilized in the field of multimedia streaming.

  • PDF

Computer-based clinical coding activity analysis for neurosurgical terms

  • Lee, Jong Hyuk;Lee, Jung Hwan;Ryu, Wooseok;Choi, Byung Kwan;Han, In Ho;Lee, Chang Min
    • Journal of Yeungnam Medical Science
    • /
    • v.36 no.3
    • /
    • pp.225-230
    • /
    • 2019
  • Background: It is not possible to measure how much activity is required to understand and code a medical data. We introduce an assessment method in clinical coding, and applied this method to neurosurgical terms. Methods: Coding activity consists of two stages. At first, the coders need to understand a presented medical term (informational activity). The second coding stage is about a navigating terminology browser to find a code that matches the concept (code-matching activity). Systematized Nomenclature of Medicine - Clinical Terms (SNOMED CT) was used for the coding system. A new computer application to record the trajectory of the computer mouse and record the usage time was programmed. Using this application, we measured the time that was spent. A senior neurosurgeon who has studied SNOMED CT has analyzed the accuracy of the input coding. This method was tested by five neurosurgical residents (NSRs) and five medical record administrators (MRAs), and 20 neurosurgical terms were used. Results: The mean accuracy of the NSR group was 89.33%, and the mean accuracy of the MRA group was 80% (p=0.024). The mean duration for total coding of the NSR group was 158.47 seconds, and the mean duration for total coding of the MRA group was 271.75 seconds (p=0.003). Conclusion: We proposed a method to analyze the clinical coding process. Through this method, it was possible to accurately calculate the time required for the coding. In neurosurgical terms, NSRs had shorter time to complete the coding and higher accuracy than MRAs.

A Comparative Study on 3D Data Performance in Mobile Web Browsers in 4G and 5G Environments

  • Nam, Duckkyoun;Lee, Daehyeon;Lee, Seunghyun;Kwon, Soonchul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.8-19
    • /
    • 2019
  • Since their emergence in 2007, smart phones have advanced up to the point that 5G mobile communication in 2019 started to be commercialized. Accordingly, now it is possible to share 3D modeling files and collaborate by means of a mobile web. As the recently commercialized 5G mobile communication network is so useful in sharing 3D modeling files and collaborating that even large-size geometry files can be transmitted at ultra high speed with ultra low transfer delay. We examines characteristics of major 3D file formats such as STL, OBJ, FBX, and glTF and compares the existing 4G LTE (Long Term Evolution) network with the 5G NR (New Radio) mobile communication network. The loading time and packets of each format were measured depending on the mobile web browser environments. We shows that in comparison with 4G LTE, the loading time of STL and OBJ file formats were reduced as much as 6.55 sec and 9.41 sec, respectively in the 5G NR and Chrome browsers. The glTF file format showed the most efficient performance in all of the 4G/5G mobile communication networks, Chrome, and Edge browsers. In the case of STL and OBJ, the traffic was relatively excessive in 5G NR and Edge browsers. The findings of this study are expected to be utilized to develop a 3D file format that reduces the loading time in a mobile web environment.

A Study on 3D File Format for Web-based Scientific Visualization

  • Lee, Geon-hee;Nam, Jeong-hwan;Han, Hwa-seop;Kwon, Soon-chul
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.243-247
    • /
    • 2019
  • The most commonly used 3D modeling file formats are OBJ (Wavefront file format specification) and STL (STereoLithography). Although they have a common point of view in 3D on the screen, detailed functions are different according to purpose of development. OBJ is the most commonly used 3D file format and STL is mainly used as 3D file format for 3D printing. However, in the field of Scientific Visualization, precise analysis is required. There is a difference in accuracy depending on the type of 3D file format. OBJ and STL are not suitable for delicate surface description because they form meshes in the form of triangular polygons. And if you increase the number of triangle polygons, it will be smoother, but the file size also increases exponentially and causes excessive CPU usage. In contrast, VTK provides a variety of polygon structures, including triangular polygons as well as rectangular polygons and cube polygons. Thus, delicate surface depiction is possible. Delicate surface rendering is possible and file size is not large. This paper describes the concept and structure of VTK. We also compared the load times and file sizes between VTK, STL, and OBJ in the Chrome browser. In addition, the difference in surface rendering ability between VTK, STL, and OBJ is intuitively viewed based on the screen in which each 3D file format is implemented under the same conditions. This study is expected to be helpful for efficient 3D file format for precise implementation of Web - based Scientific Visualization.

A Study on Constructing and Customizing an AtoM System (AtoM 시스템의 구축과 커스터마이징 방법에 관한 연구)

  • An, Dae-Jin;Kim, Ik-Han
    • The Korean Journal of Archival Studies
    • /
    • no.45
    • /
    • pp.5-50
    • /
    • 2015
  • In 2012, the International Council on Archives(ICA) distributed AtoM public release, an archival description software based on web, for free to support small archival institutions. The purpose of AtoM project was to let a single or multiple repositories describe archival materials based on ICA descriptive standards and access via a web browser. The value of AtoM project is to promote actual business experience by sharing technical expertise and form active community between users and developers. Recently, there is a growing interest in open source software in the field of domestic record management. This interest is to not only reduce cost, but to escape technology dependencies and to address requirements on the field. The critical mind of this study lies in the fact that there is no practical methodology to establish AtoM system. Even when using AtoM itself, basic tasks such as the migration of the existing data or the improvement of user interface are required. That is why this study suggests the process and methodologies to establish and customize archival information system based on AtoM software.

Proposal of Content Recommend System on Insurance Company Web Site Using Collaborative Filtering (협업필터링을 활용한 보험사 웹 사이트 내의 콘텐츠 추천 시스템 제안)

  • Kang, Jiyoung;Lim, Heuiseok
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.201-206
    • /
    • 2019
  • While many users searched for insurance information online, there were not many cases of contents recommendation researches on insurance companies' websites. Therefore, this study proposed a page recommendation system with high possibility of preference to users by utilizing page visit history of insurance companies' websites. Data was collected by using client-side storage that occurs when using a web browser. Collaborative filtering was applied to research as a recommendation technique. As a result of experiment, we showed good performance in item-based collaborative (IBCF) based on Jaccard index using binary data which means visit or not. In the future, it will be possible to implement a content recommendation system that matches the marketing strategy when used in a company by studying recommendation technology that weights items.

A Method for Original IP Detection of VPN Accessor (VPN 접속자의 원점 IP 탐지 방법)

  • Kim, Inhwan;Kim, Dukyun;Cho, Sungkuk;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • In most hacking attacks, hackers tend to access target systems in a variety of circumvent connection methods to hide their original IP. Therefore, finding the attacker's IP(Internet Protocol) from the defender's point of view is one of important issue to recognize hackers. If an attacker uses a proxy, original IP can be obtained through a program other than web browser in attacker's computer. Unfortunately, this method has no effect on the connection through VPN(Virtual Private Network), because VPN affects all applications. In an academic domain, various IP traceback methods using network equipments such as routers have been studied, but it is very difficult to be realized due to various problems including standardization and privacy. To overcome this limitation, this paper proposes a practical way to use client's network configuration temporarily until it can detect original IP. The proposed method does not only restrict usage of network, but also does not violate any privacy. We implemented and verified the proposed method in real internet with various VPN tools.

Cognitive Approach to Anti-Phishing and Anti-Pharming (피싱 및 파밍 방지를 위한 인지 기반의 접근 방법)

  • Kim, Ju-Hyun;Maeng, Young-Jae;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.113-124
    • /
    • 2009
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser, but they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or pharming is presented, using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or pharming, but observes if there were HTML code changing between plug-ins and a server.